2012
DOI: 10.1007/978-3-642-35308-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Noninterference for Operating System Kernels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
44
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 56 publications
(44 citation statements)
references
References 19 publications
0
44
0
Order By: Relevance
“…Some target information ow properties [7,12,15,18], based on variants of noninterference [11]. Other work establishes a re nement relation between kernel code, in some representation, and an abstract speci cation.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Some target information ow properties [7,12,15,18], based on variants of noninterference [11]. Other work establishes a re nement relation between kernel code, in some representation, and an abstract speci cation.…”
Section: Related Workmentioning
confidence: 99%
“…As is the case with most re nement/simulation-based approaches, this work does not address information ow. In recent work on seL4 veri cation, Murray et al [14,15] present an unwinding-style characterization of intransitive noninterference. They introduce a proof calculus on nondeterministic state monads that is similar to that of this work.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the ongoing proof of confidentiality for the seL4 microkernel [6], a proof calculus was used to formalize an upper bound on the information that a function can read. This involves reasoning about multiple executions of a function, which cannot be easily expressed in Hoare logic.…”
Section: Case Study: Sel4mentioning
confidence: 99%
“…Function annotations can still be used when proving such a property by explicitly turning annotations into assertions, effectively converting back into a standard function while retaining some information from the annotations. The standard confidentiality calculus [6] can then be applied and make use of the assertions.…”
Section: Case Study: Sel4mentioning
confidence: 99%